October, 2015

article thumbnail

Kali Moto End of Life & Kali Dojo Slides

Kali Linux

Kali Sana Release Aftermath Kali Linux 2.0 has been out for a couple of months and the response has been great, with well over a million unique downloads of Kali 2.0 as a testament. Release day was somewhat hectic for us, as we did not anticipate the sheer volume of traffic … which we somehow always underestimate. In the first few days after the release of 2.0, we had ten times the download volume of 1.0 in a similar period, back in 2013.

52
article thumbnail

Consumers: The Last Best Mile of the Security Perimeter

NopSec

For consumers and businesses alike, when it comes to keeping private information private your best defense is vigilance; in both instances updating patches whenever they are available. In fact, organizations are battling hackers every day, working to patch holes on servers and in applications to ensure data is not compromised. Consumers, too, have a responsibility to do the same when new software patches are released.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crackas With Attitude strike again?

Digital Shadows

Last week, the New York Post reported that hackers had compromised the personal email address of CIA Director, John Brennan. The post Crackas With Attitude strike again? first appeared on Digital Shadows.

article thumbnail

Safe Harbor: A29 Statement Released on “What’s Next?”

Privacy and Cybersecurity Law

The Article 29 Working Party has, today, published its Statement following the Safe Harbor decision last week. It’s been confirmed […].

40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

TalkTalk: Avoiding The Hype

Digital Shadows

There has been no shortage of media coverage on the recent TalkTalk cyber attack. The full implications of the attack. The post TalkTalk: Avoiding The Hype first appeared on Digital Shadows.

article thumbnail

Smilex: Dangers of Poor OpSec

Digital Shadows

Background On 13 Oct 2015, it was revealed in an indictment on the US department of Justice website that Dridex. The post Smilex: Dangers of Poor OpSec first appeared on Digital Shadows.

More Trending

article thumbnail

Online Carding

Digital Shadows

There is no shortage of credit card information being sold online. In the past six months alone, our spider (which covers I2P. The post Online Carding first appeared on Digital Shadows.

article thumbnail

Safe Harbor Decision today!

Privacy and Cybersecurity Law

Today, the Court of Justice of the European Union (CJEU) handed down its ruling in relation to the Schrems case. […].

40